Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Export Word 2008's Audio Notes to Your iPod

You can use Word 2008's Notebook Layout View to take notes and record audio for lectures. Choose View > Notebook Layout View. Click the Audio icon in the Notebook Layout toolbar and then adjust the input volume and click the round recording button. Any notes you type while recording audio are coordinated with the audio. Sync your notes to your iPod for on-the-go studying. Choose Tools > Audio Notes > Export Audio. Save the file to your iTunes music folder.

Visit Mactopia - Word 2008

Submitted by
Microsoft MacBU

 
 

Take Control News: Is Your Wireless Network Secure?

Send Article to a Friend

We've just released a new version of "Take Control of Your Wi-Fi Security," penned jointly by wireless networking guru Glenn Fleishman and Take Control publisher Adam Engst. The ebook is aimed at anyone who is running a home or small-office wireless network and who wants to set up and maintain an appropriate security level for their needs and budget. Glenn and Adam have been publishing articles and books about wireless security for ages, so this new version contains the distilled essence of years of thinking about the topic, along with fresh material to bring their discussions up to date for 2009. They have added the latest details relating to Mac OS X 10.5 Leopard, current recommendations for setting up WPA and WPS security, and steps for configuring guest networking with Apple's recently released base stations. To ensure that your wireless network is appropriately secure, pick up a copy of the $10 ebook.

Although the last update to "Take Control of Your Wi-Fi Security" came in October 2007, we're still making this version a free update for anyone who owns a previous edition of the ebook. In your existing PDF, click Check for Updates on the first page to access a download link.

"Take Control of Your Wi-Fi Security" helps you assess your real-world security risk, and aids in evaluating the likelihood of a security-related problem, the potential severity of a break-in, and the opportunity cost of securing your wireless network. It then goes on to explain the pros and cons of various security techniques, explaining how to implement the best ones to secure your network and your data in transit. It covers Mac OS X, Windows XP, and Windows Vista.

 

READERS LIKE YOU! Support TidBITS by becoming a member today!
Check out the perks at <http://tidbits.com/member_benefits.html>
Special thanks to Anthony Bull, Charles Elliott, sheila hobbs, and
Scott Hards for their generous support!